diff options
author | Kurt Roeckx <kurt@roeckx.be> | 2016-06-05 23:34:57 +0200 |
---|---|---|
committer | Kurt Roeckx <kurt@roeckx.be> | 2016-06-14 19:30:36 +0200 |
commit | 947f3156ecedbc62e21da3569fc291166b3bc086 (patch) | |
tree | 319270256fdc64b850c0f8ddaeeab0ea18f1ac67 /fuzz/corpora/asn1/88dd449a1260b6a53b9a50c74db8ff8daed6b70f | |
parent | b2e8bd7bd555ad6826dd44f38c68425d92e86e95 (diff) | |
download | openssl-new-947f3156ecedbc62e21da3569fc291166b3bc086.tar.gz |
Initialize the session_id
ssl_session_hash() always looks at the first 4 bytes, regardless of the length.
A client can send a session id that's shorter, and the callback could also
generate one that's shorter. So we make sure that the rest of the buffer is
initliazed to 0 so that we always calculate the same hash.
Found by tis-interpreter, also previously reported as RT #2871
Reviewed-by: Rich Salz <rsalz@openssl.org>
MR: #2911
Diffstat (limited to 'fuzz/corpora/asn1/88dd449a1260b6a53b9a50c74db8ff8daed6b70f')
0 files changed, 0 insertions, 0 deletions